article thumbnail

Win the connected and autonomous car race while protecting data privacy

Thales Cloud Protection & Licensing

This honeypot of information puts manufacturers at major risk from cyber attacks. Accelerate digital transformation by reducing risk, complexity, and cost. Nevertheless, they create major privacy and data protection vulnerabilities.

article thumbnail

MY TAKE: Why speedy innovation requires much improved cyber hygiene, cloud security

The Last Watchdog

Speed is what digital transformation is all about. On the one hand, this has created a visibility challenge: companies racing ahead with digital transformation have lost track of all of the APIs they’re using to stitch together their digital services. The deployment of APIs has expanded exponentially.

Cloud 162
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Episode 255: EDM, Meet CDM – Cyber Dance Music with Niels Provos

The Security Ledger

Software is now central to the operation of our economy – as digital transformation washes over every industry. Niels Provos has a storied, two decade career on the forefront of cybersecurity, starting in the late 1990s with his work as a graduate student on phenomena like steganography and honeypots.

article thumbnail

Q&A: How emulating attacks in a live environment can more pervasively protect complex networks

The Last Watchdog

We’ve set up honeypots around the world, which we use to harvest and categorize malware. Network complexity is only going to increase with as we move forward with digital transformation and the Internet of Things. And we’re also collecting intelligence about attacks that target known vulnerabilities.